Role-based training is playing a bigger and bigger role in the world of security awareness and managing human risk. So, what exactly is it, why should you care and ultimately, how does one build a role-based training program?
What is Role-Based Security Awareness Training?
First, what is role-based training? Ultimately, it is providing the right training to the right people and nothing more. Traditional security training can often be a one-size-fits-all solution where everyone takes the same training. For certain topics this makes sense. For example, just about everyone has passwords so the entire workforce should most likely be trained on how to create and use strong passwords / authentication. Just about everyone can be targeted for scams, so the entire workforce should most likely be trained on how to spot and stop social engineering attacks. Topics like these are called “core” or “foundational” training as it’s training that applies to everyone.
However, there are often certain topics that do not apply to everyone. For example, compliance training like PCI-DSS only needs to be provided to people who handle cardholder data, or the people who manage the systems that store or process cardholder data. Not everyone may have administrative accounts, so not everyone needs training on privileged access. Role-based training means you go above and beyond just foundational training for everyone and create additional specialized training for specific roles, as different roles have unique responsibilities and unique risks.
Compliance-driven role-based training
The two most common categories of role-based training are compliance driven and risk driven. Compliance driven role-based training is training for certain roles to meet certain compliance standards, which is usually driven by the type of data someone handles. For example, GDPR training is required for anyone handling Personally Identifiable Information (PII) of an EU resident. HIPAA training is required for anyone handling PHI (Personal Healthcare Information) in healthcare. Role-based training is for risk reasons. Certain roles are often considered higher risk, as they are more likely to be actively targeted (such as an Accounts / Payables employee). If an incident does happen in such roles, it can cause far greater harm due to the fact that these people are working with highly sensitive data, systems, or applications (such as IT Admins or Developers). These roles require additional training to address their unique risks; often this training is far more technical in nature.
Compliance role-based training is usually the simpler of the two and has been around for years. You first identify the standards you need to comply with (such as PCI-DSS), the roles that fall under the standard (anyone who handles cardholder data or the systems that manage cardholder data), and provide the required training. This training is often already available from security or compliance vendors. The goal is ultimately checking the box, making sure you meet the training requirements of the different standards. A key to success with compliance training is keeping it as short as possible, as it can be frightfully boring, especially if people have to train on multiple compliance standards. To both identify the roles and source the training, you will most likely have to work with your audit, compliance, legal and / or GRC (Governance, Risk, Compliance) teams.
Compliance-driven role-based training
- Role-based training is often the next step for organizations that already have a foundational security awareness program in place.